Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles during shutdown, which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "chromium-browser",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
},
{
"binary_name": "chromium-browser-l10n",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
},
{
"binary_name": "chromium-chromedriver",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
},
{
"binary_name": "chromium-codecs-ffmpeg",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
},
{
"binary_name": "chromium-codecs-ffmpeg-extra",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "chromium-browser",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
},
{
"binary_name": "chromium-browser-l10n",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
},
{
"binary_name": "chromium-chromedriver",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
},
{
"binary_name": "chromium-codecs-ffmpeg",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
},
{
"binary_name": "chromium-codecs-ffmpeg-extra",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
}
]
}